#20053 |
Plan refactoring of metrics-web modules
|
assigned
|
metrics-team
|
enhancement
|
Medium
|
Metrics 1.0.0
|
#393 |
hidden services resolve hosts only once
|
assigned
|
rransom
|
defect
|
Low
|
Tor: unspecified
|
#449 |
dns failures prevent legitimate options being set
|
assigned
|
|
defect
|
Low
|
Tor: unspecified
|
#469 |
please limit connections by client
|
needs_revision
|
|
defect
|
Low
|
Tor: unspecified
|
#584 |
Clients process descriptor fetches as they arrive?
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#697 |
Wrong DNS configuration could break navigation
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#925 |
Tor fails badly when accept(2) returns EMFILE or ENFILE
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#966 |
Do positive DNS tests
|
reopened
|
|
defect
|
Low
|
Tor: unspecified
|
#1029 |
Tor relay should log message when it's working again after marking as down
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#1075 |
reachability controller status events too liberal
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#1099 |
Spurious bootstrap warnings if no-route-to-host
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#1102 |
Queuing v3 signature for next consensus, an hour later?
|
needs_information
|
|
defect
|
Low
|
Tor: unspecified
|
#1116 |
'Stable' flag assignment inconsistant
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#1127 |
no shutdown descriptor published when ORPort is closed but client stays up
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#1136 |
When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#1181 |
evdns_server_request_format_response() sets TC flag wrong
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#1193 |
Measured BW Authority will not work on private networks with less than 3 scanners
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#1238 |
Exit flag assigned can be assigned to nodes that don't really exit.
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#1247 |
bootstrap hickups when network is down
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#1250 |
strange SOCKS error code when connecting to a hidden service using the wrong port
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#1299 |
Tor should verify signatures before parsing
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#1354 |
Configuring Tor with --with*dir gives wrong directories
|
assigned
|
|
defect
|
High
|
Tor: unspecified
|
#1749 |
Split relay and link crypto across multiple CPU cores
|
assigned
|
chelseakomlo
|
project
|
High
|
Tor: unspecified
|
#1784 |
RELAY_TRUNCATE should give cell queues a chance to flush
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#1802 |
ControlPort GETCONF does not recognize command aliases
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#1889 |
Contradictory bandwidth reports in overlapping extra-info descriptors
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#1926 |
Extra-info descriptors have corrupt {write,read}-history lines
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#2003 |
Hibernation Soft and Hard Limits Reached Simultaneously
|
assigned
|
Sebastian
|
enhancement
|
Medium
|
Tor: unspecified
|
#2077 |
Overwriting files can fail on Windows
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#2178 |
We launch dummy descriptor fetches more often than needed
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#2179 |
Stream fairness: Stop packaging inbufs onto circuits greedily
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#2180 |
We should test for fairness on entry and exit connections
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#2282 |
Publish router descriptors rejected by the authorities or omitted from the consensus
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#2362 |
"GETINFO config-text" adds spurious DataDirectory, Log entries
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#2395 |
Break Wed and Wee weights into two classes each
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#2455 |
Log IP of wrongly replying DNS-Server(s)
|
needs_revision
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#2473 |
Develop a design to support multiple bridge authorities
|
new
|
|
project
|
Low
|
Tor: unspecified
|
#2506 |
Design and implement a more compact GeoIP file format
|
assigned
|
endian7000
|
enhancement
|
Medium
|
Tor: unspecified
|
#2507 |
It's probably not spelled "NATD"
|
new
|
|
defect
|
Very Low
|
Tor: unspecified
|
#2628 |
Be smarter about launching connections to authorities to learn about clock skew
|
new
|
|
project
|
Medium
|
Tor: unspecified
|
#2664 |
DoS and failure resistence improvements
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#2665 |
Create a dirauth DoS response procedure
|
new
|
|
task
|
High
|
Tor: unspecified
|
#2667 |
Exits should block reentry into the tor network
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#2681 |
brainstorm ways to let Tor clients use yesterday's consensus more safely
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#2693 |
Design and implement improved algorithm for choosing consensus method
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#2715 |
Is rephist-calculated uptime the right metric for HSDir assignment?
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#2743 |
safelogging should cover hidden service name and intro-points too
|
assigned
|
rransom
|
defect
|
Medium
|
Tor: unspecified
|
#2914 |
Tor should truncate log file if loglevel < notice
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#2915 |
Explore options to reduce binary size of Tor
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#2967 |
bad pidfile handling on ENOSPC
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#2983 |
Errant circuit creation beyond MAPADDRESS validity
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#2991 |
Confusing log messages when a DA starts using a new key
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#2998 |
If your bridge is near your exit, Tor might surprise you by failing your circuit
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#3021 |
Make the microdesc format a little more flexible, with optional TAP key
|
assigned
|
|
defect
|
High
|
Tor: unspecified
|
#3029 |
We should save received documents before parsing them
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#3037 |
Internal checks to detect client streams/circuits whose sock request vanished
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#3080 |
Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes.
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#3145 |
excludeexitnodes by ip misleading when exit relay uses outboundbindaddress
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#3217 |
When bridges change, only close the circuits for the bridges we stopped using
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#3241 |
Seeing lots of "crypto error while reading public key from string" on DA
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#3266 |
gabelmoo publishes only 1 extra-info descriptor per week
|
needs_information
|
|
defect
|
Low
|
Tor: unspecified
|
#3290 |
Design some way to ensure circuit reuse for FTP (and other?) multi-connection protocols
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#3317 |
Tor should lock its HiddenServiceDirs
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#3322 |
We don't retry our bridges if we have an unconfigured bridge that's up
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#3459 |
Expose information about dir conns to controllers
|
accepted
|
rransom
|
enhancement
|
Low
|
Tor: unspecified
|
#3501 |
Teach Tor to run the Control Port over TLS
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#3511 |
Automatically chosen published ports should be stable
|
assigned
|
blackpaw
|
enhancement
|
High
|
Tor: unspecified
|
#3520 |
CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell
|
new
|
rransom
|
enhancement
|
Medium
|
Tor: unspecified
|
#3522 |
Allow controllers to post HS descriptors to Tor's cache
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#3566 |
Should controller events respect SafeLogging 1 torrc option?
|
new
|
chiiph
|
enhancement
|
Low
|
Tor: unspecified
|
#3587 |
Accounting should work with pluggable transports
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#3652 |
Export clock skew opinion as getinfo command
|
needs_revision
|
|
enhancement
|
High
|
Tor: unspecified
|
#3698 |
Multi-line torrc options conflict with Windows paths
|
assigned
|
Jigsaw52
|
defect
|
Low
|
Tor: unspecified
|
#3767 |
Allow Tor to listen on a specific interface for ORPort
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#3782 |
Add native chroot support to Tor
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#3852 |
Make DNS resolution happen on particular exit nodes for particular hostnames
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#3876 |
Simplify format_win_commandline_argument() implementation.
|
new
|
sjmurdoch
|
defect
|
Very Low
|
Tor: unspecified
|
#3943 |
self-test the socks port before bootstrapping is complete?
|
needs_information
|
|
enhancement
|
Low
|
Tor: unspecified
|
#3948 |
"fooport auto" should be able to get a hint
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#3982 |
MAPADDRESS for IP ranges (CIDR, etc)
|
reopened
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#4036 |
Tor relays/bridges can detect when they are being filtered by SSL cert
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#4085 |
We discard up to one second's worth of accounting bytes when time moves backward?
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#4229 |
smartlist_len returns a (signed) int
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#4233 |
Exact addition/summation and memory allocation
|
needs_revision
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#4260 |
[PATCH] Update TOR build instructions for mingw
|
assigned
|
erinn
|
enhancement
|
High
|
Tor: unspecified
|
#4320 |
Audit functions called during options_act_reversible()
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#4363 |
Dirauths should save a copy of a consensus that didn't get enough signatures
|
needs_revision
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#4374 |
If you explicitly specify a geoip file and it's not there, shouldn't Tor fail?
|
needs_revision
|
|
enhancement
|
Very Low
|
Tor: unspecified
|
#4386 |
Requesting better "too slow" warning message
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#4391 |
`GETINFO ns/all` doesn't return 'p' lines -- make something that does!
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#4539 |
Make dir auths write to disk digests that don't match
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#4565 |
Enable relays to talk to other relays via IPv6
|
assigned
|
ln5
|
project
|
Medium
|
Tor: unspecified
|
#4581 |
Dir auths should defend themselves from too many begindir requests per address
|
needs_revision
|
|
defect
|
High
|
Tor: unspecified
|
#4624 |
Config option to declare whether you're using bridges for reachability or for security
|
new
|
|
project
|
Medium
|
Tor: unspecified
|
#4631 |
Idea to make consensus voting more resistant
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#4648 |
Tor shouldn't call expand_filename on filenames specified on the command line
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#4682 |
Deal with 'double door' effects because our read and write rate limiting are independent
|
assigned
|
arma
|
project
|
Medium
|
Tor: unspecified
|
#4692 |
If only a working static OpenSSL is available, ./configure fails
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#4696 |
add OutboundBindInterface option to torrc
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#4712 |
Review and update any existing patches for proposal 182 ("credit buckets")
|
new
|
|
task
|
Medium
|
Tor: unspecified
|